{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T03:34:31Z","timestamp":1770089671014,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,21]]},"DOI":"10.1145\/3787256.3787278","type":"proceedings-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T16:23:12Z","timestamp":1770049392000},"page":"145-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bio-inspired Hyperparameter Optimization for Deep Learning Malware Detection: An Empirical Study Across AIS and Evolutionary Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4598-7956","authenticated-orcid":false,"given":"Kgosietsile D.","family":"Mokone","sequence":"first","affiliation":[{"name":"Academy of Computer Science and Software Engineering, University of Johannesburg, Auckland Park, Gauteng, South Africa,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8073-6998","authenticated-orcid":false,"given":"Siphesihle P.","family":"Sithungu","sequence":"additional","affiliation":[{"name":"Academy of Computer Science and Software Engineering, University of Johannesburg, Auckland Park, Gauteng, South Africa,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7551-2233","authenticated-orcid":false,"given":"Elizabeth M.","family":"Ehlers","sequence":"additional","affiliation":[{"name":"Academy of Computer Science and Software Engineering, University of Johannesburg, Auckland Park, Gauteng, South Africa,"}]}],"member":"320","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Optimizing Deep Learning Models for Malware Detection using Artificial Immune System and Evolutionary Algorithms. Master's Dissertation","unstructured":"Kgosietsile Mokone. 2025. Optimizing Deep Learning Models for Malware Detection using Artificial Immune System and Evolutionary Algorithms. Master's Dissertation. University of Johannesburg, South Africa. Manuscript in preparation."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"T. Jabid S. Masum R. A. Shams A. Chowdhury M. M. Islam M. H. Ferdaus M. S. Ali and M. Islam. 2025. A brief history of ransomware. In Ransomware Evolution. CRC Press Boca Raton FL 3\u201317.","DOI":"10.1201\/9781003469506-2"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.9734\/jerr\/2024\/v26i61188"},{"key":"e_1_3_3_1_4_2","volume-title":"Proceedings of the Workshop on Machine Learning in High-Performance Computing Environments. 1\u20135.","author":"Young S. R.","unstructured":"S. R. Young, D. C. Rose, T. P. Karnowski, S.-H. Lim, and R. M. Patton. 2015. Optimizing deep learning hyper-parameters through an evolutionary algorithm. In Proceedings of the Workshop on Machine Learning in High-Performance Computing Environments. 1\u20135."},{"key":"e_1_3_3_1_5_2","first-page":"6","article-title":"2019. Optimal convolutional neural network architecture design using clonal selection algorithm","volume":"9","author":"Al Bataineh A.","year":"2019","unstructured":"A. Al Bataineh and D. Kaur. 2019. Optimal convolutional neural network architecture design using clonal selection algorithm. Int. J. Mach. Learn. Comput. 9, 6 (2019), 788\u2013794.","journal-title":"Int. J. Mach. Learn. Comput."},{"key":"e_1_3_3_1_6_2","volume-title":"Proceedings of the 2024 International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications (COSMIC). IEEE, 66\u201371","author":"Kumar S. S.","unstructured":"S. S. Kumar and J. Shetty. 2024. Malicious PE File Detection Using Machine Learning: An Analysis of Header Features. In Proceedings of the 2024 International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications (COSMIC). IEEE, 66\u201371."},{"key":"#cr-split#-e_1_3_3_1_7_2.1","doi-asserted-by":"crossref","unstructured":"M. A. Ayub and A. Siraj. 2021. Similarity analysis of ransomware based on portable executable","DOI":"10.1109\/SSCI50451.2021.9660019"},{"key":"#cr-split#-e_1_3_3_1_7_2.2","unstructured":"(PE) file metadata. In Proceedings of the 2021 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE 1-6."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103151"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101760"},{"key":"e_1_3_3_1_10_2","unstructured":"K. Han A. Xiao E. Wu J. Guo C. Xu and Y. Wang. 2021. Transformer in Transformer. In Advances in Neural Information Processing Systems 34. 15908\u201315919."},{"key":"e_1_3_3_1_11_2","unstructured":"R. C. Staudemeyer and E. R. Morris. 2019. Understanding LSTM: A tutorial into long short-term memory recurrent neural networks. arXiv:1909.09586 (2019)."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0731-7085(99)00272-1"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.3390\/pr11020349"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/aisy.202170077"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13188"},{"key":"e_1_3_3_1_17_2","first-page":"1","article-title":"2023. Adaptive Bayesian contextual hyperband: A novel hyperparameter optimization approach","volume":"13","author":"Rao L. P. S.","year":"2023","unstructured":"L. P. S. Rao and S. Jaganathan. 2023. Adaptive Bayesian contextual hyperband: A novel hyperparameter optimization approach. Int. J. Artif. Intell. 13, 1 (2023), 775\u2013785.","journal-title":"Int. J. Artif. Intell."},{"key":"e_1_3_3_1_18_2","volume-title":"Proceedings of the Computer Science On-line Conference. Springer International Publishing, Cham, 15\u201325","author":"Naidu G.","unstructured":"G. Naidu, T. Zuva, and E. M. Sibanda. 2023. A review of evaluation metrics in machine learning algorithms. In Proceedings of the Computer Science On-line Conference. Springer International Publishing, Cham, 15\u201325."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"D. Harris-Birtill and R. Harris-Birtill. 2021. Understanding computation time: a critical discussion of time as a computational performance metric. In Time in Variance. Brill 220\u2013248.","DOI":"10.1163\/9789004470170_014"},{"key":"e_1_3_3_1_20_2","volume-title":"Proceedings of the Australasian Conference on Information Security and Privacy. Springer Berlin Heidelberg","author":"Sathyanarayan V. S.","unstructured":"V. S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. 2008. Signature generation and detection of malware families. In Proceedings of the Australasian Conference on Information Security and Privacy. Springer Berlin Heidelberg, Berlin, Heidelberg, 336\u2013349."},{"key":"e_1_3_3_1_21_2","first-page":"1","article-title":"2012. Random search for hyper-parameter optimization","volume":"13","author":"Bergstra J.","year":"2012","unstructured":"J. Bergstra and Y. Bengio. 2012. Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, 1 (2012), 281\u2013305.","journal-title":"J. Mach. Learn. Res."}],"event":{"name":"CIIS 2025: 2025 The 8th International Conference on Computational Intelligence and Intelligent Systems","location":"Okayama , Japan","acronym":"CIIS 2025"},"container-title":["Proceedings of the 2025 8th International Conference on Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3787256.3787278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T16:23:38Z","timestamp":1770049418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3787256.3787278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":22,"alternative-id":["10.1145\/3787256.3787278","10.1145\/3787256"],"URL":"https:\/\/doi.org\/10.1145\/3787256.3787278","relation":{},"subject":[],"published":{"date-parts":[[2025,11,21]]},"assertion":[{"value":"2026-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}